[Yahoo-eng-team] [Bug 1840647] Re: EC2 API Auth Failure

2019-09-26 Thread Morgan Fainberg
As shown here: https://storage.gra1.cloud.ovh.net/v1/AUTH_dcaab5e32b234d56b626f72581e3644c/zuul_opendev_logs_d9c/680481/1/check/ec2 -api-functional-neutron/d9c3627/logs/etc/keystone/keystone.conf.txt.gz You are using 'backend = oslo_cache.dict' this is no way is representative of any

[Yahoo-eng-team] [Bug 1842930] Re: Deleted user still can delete volumes in Horizon

2019-09-23 Thread Morgan Fainberg
Added Keystonemiddleware and documentation tags. Marked as "medium" importance as it requires documentation changes but is not critical/RC/otherwise impacting. Clear communication of expected behavior is important and should be found in Horizon and Keystonemiddleware's documentation. I am marking

[Yahoo-eng-team] [Bug 1840288] Re: Trusts GET API leaks existence information to unauthorized users

2019-08-16 Thread Morgan Fainberg
Discussed in IRC[0] - conclusion is this is a Valid bug but there is no reasonable attack vector (the data could be used in determining whom to attempt to gain access to, but does not provide any means of direct attack). The data is *NOT* intended to be public but is not really explicitly

[Yahoo-eng-team] [Bug 1837010] Re: [RFE] event callback dynamic loading

2019-07-30 Thread Morgan Fainberg
This isn't really a good idea. The way keystone's internal notification framework is implemented, errors in that framework can leave the DB in inconsistent states. If this were to be implemented any implementations that are 3rd party could not reasonably be supported by the Keystone team

[Yahoo-eng-team] [Bug 1837061] [NEW] RFE: Application Credential API (CRUD) to 403 if app-cred auth method not enabled

2019-07-18 Thread Morgan Fainberg
Public bug reported: There has been some confusion about the Application Credential API. Specifically that application credentials can be created even if the auth method is not enabled. The request is to make the Application Credential API return a 403 (Forbidden) if the auth method is not

[Yahoo-eng-team] [Bug 1816164] Re: RFE: Service Catalog Subsets by IDs

2019-05-04 Thread Morgan Fainberg
As discussed at the Denver PTG this is not really something we want to handle. Breaking the catalog representation in the token could break huge swaths of consumers and adding this as functionality is pretty low priority vs. considering a new catalog form/mechanism. ** Changed in: keystone

[Yahoo-eng-team] [Bug 1819957] Re: Caching with stale data when a server disconnects due to network partition and reconnects

2019-03-25 Thread Morgan Fainberg
Keystone is fixed with oslo.cache fix, marked as invalid for keystone ** Changed in: keystone Status: Triaged => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1819957] [NEW] Caching with stale data when a server disconnects due to network partition and reconnects

2019-03-13 Thread Morgan Fainberg
only thing affected by the network partitioning). This similarly needs to be addressed in pymemcache when it is utilized in lieu of python-memcached. ** Affects: keystone Importance: High Assignee: Morgan Fainberg (mdrnstm) Status: New ** Affects: keystonemiddleware Import

[Yahoo-eng-team] [Bug 1808059] Re: admin user should have service scoped admin role

2018-12-12 Thread Morgan Fainberg
Please do not try and make the NFV-feature specific bug something different. Please open a new bug for features to bootstrap. Second, there are bugs to open with the NFV plugins to support system scope. This bug remains opinion. ** Changed in: keystone Status: New => Opinion -- You

[Yahoo-eng-team] [Bug 1808059] Re: admin user should have admin role in the Default domain

2018-12-12 Thread Morgan Fainberg
I disagree with this needing to be in bootstrap. The main reason is that bootstrap is intended to simply get a deployment to a place where it can be setup. Since this is only some 3rd party plugins for NFV, this is something the deployment can choose to do. Bootstrap is and always will be

[Yahoo-eng-team] [Bug 1802136] Re: RFE: Keystone SQL backend (and `user_create` API) should support prehashed passwords

2018-12-10 Thread Morgan Fainberg
Discussed this with the Keystone core team and we came to the following conclusions: * This is prone to errors. It is easy to create an unusable password and short of also submitting the plaintext password keystone can't ensure the hash, ident, and metadata is sane. * This doesn't meaningfully

[Yahoo-eng-team] [Bug 1807751] [NEW] Resource Options Implemented for all Resource Types

2018-12-10 Thread Morgan Fainberg
Importance: Wishlist Assignee: Morgan Fainberg (mdrnstm) Status: Triaged ** Changed in: keystone Status: New => Triaged ** Changed in: keystone Importance: Undecided => Wishlist ** Changed in: keystone Assignee: (unassigned) => Morgan Fainberg (mdrnstm) -- You

[Yahoo-eng-team] [Bug 1801778] Re: Keystone circular reference on OPTIONS

2018-11-18 Thread Morgan Fainberg
Marking this as invalid in Triple-O, there is an underlying issue in keystone causing the "recursive" error. The OPTIONS bug solved the issue directly. ** Changed in: tripleo Status: Triaged => Invalid ** Summary changed: - Keystone circular reference on OPTIONS + Keystone 500 on OPTIONS

[Yahoo-eng-team] [Bug 1801778] Re: Keystone circular reference on OPTIONS

2018-11-09 Thread Morgan Fainberg
Assignee: (unassigned) => Morgan Fainberg (mdrnstm) -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1801778 Title: Keystone circular reference on OPTIONS Status in OpenSt

[Yahoo-eng-team] [Bug 1642988] Re: Optionally encode project IDs in fernet tokens

2018-11-01 Thread Morgan Fainberg
Revisiting to mark as wont fix after reading through it. This is a misunderstanding of the fernet packing and that the token payload is intended to be a blackbox and decoded/expanded by keystone itself. ID formats (dashes, no dashes, etc) are the purview of keystone. ** Changed in: keystone

[Yahoo-eng-team] [Bug 1553224] Re: keystone-manage bootstrap assumes user-project role assignment

2018-11-01 Thread Morgan Fainberg
This is not really in the plans. Bootstrap is meant to get you to a place you can setup the rest of the system via the APIs. It is intentionally very narrow. Marking as wont fix. ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a

[Yahoo-eng-team] [Bug 1498556] Re: Reasonable assumptions concerning domain references

2018-10-26 Thread Morgan Fainberg
Keystone no longer has v2/v3 split. V3 is always explicit about domain membership (as per the description of the bug). Moving this to "Wont Fix" for the server. ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo!

[Yahoo-eng-team] [Bug 1180136] Re: Dependency injection framework is constructing the object first and then injecting the dependency which is incorrect

2018-10-26 Thread Morgan Fainberg
Dependency Injection was removed/reworked. This is no longer an issue. ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1623117] Re: Prevent keystone from serving requests when schema or data migrations are not up to date

2018-10-25 Thread Morgan Fainberg
This is in violation of the rolling upgrade plans. Marking as "wont fix" ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1660603] Re: Difference in Implied Roles check API return code

2018-10-25 Thread Morgan Fainberg
Marking as "invalid" now. ** Changed in: keystone Status: Confirmed => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1660603 Title: Difference in

[Yahoo-eng-team] [Bug 1797876] Re: Default values for registered limit allows to set negative value

2018-10-25 Thread Morgan Fainberg
Marking as wont fix, the -1 is correct behavior for "no limit". ** Changed in: keystone Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1780164] Re: httpd leaks open files

2018-10-24 Thread Morgan Fainberg
We should fix keystoneclient. KeystoneAuth is not doing anything wrong here. I am against a "temp hack" like this. Secondarily, please submit this patch to gerrit at review.openstack.org so that it can be considered. Posting patches here is unlikely to be seen as easily/readily. ** Changed in:

[Yahoo-eng-team] [Bug 1498556] Re: Reasonable assumptions concerning domain references

2018-10-24 Thread Morgan Fainberg
** Changed in: keystoneauth Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1498556 Title: Reasonable assumptions concerning

[Yahoo-eng-team] [Bug 1659053] Re: use uuids with pycadf

2018-10-24 Thread Morgan Fainberg
** Changed in: pycadf Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1659053 Title: use uuids with pycadf Status in

[Yahoo-eng-team] [Bug 1699060] Re: Impossible to define policy rule based on domain ID

2018-10-24 Thread Morgan Fainberg
@Ben, this is nothing to do with oslo-policy. it has to do with the values passed to oslo-policy in the creds dict. If the creds dict does not have domain-id populated in it, you can't enforce on it. ** Changed in: oslo.policy Status: Incomplete => Invalid -- You received this bug

[Yahoo-eng-team] [Bug 1687593] Re: Create OAUTH request token gives 401 error when request url is admin endpoint

2018-10-24 Thread Morgan Fainberg
** Changed in: python-keystoneclient Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1687593 Title: Create OAUTH request

[Yahoo-eng-team] [Bug 1710329] Re: support for chinese name to show

2018-10-24 Thread Morgan Fainberg
Is this something in the Keystone Server? this doesn't seem to be KSC specific. ** Changed in: python-keystoneclient Status: In Progress => Incomplete ** Also affects: keystone Importance: Undecided Status: New -- You received this bug notification because you are a member of

[Yahoo-eng-team] [Bug 1266962] Re: Remove set_time_override in timeutils

2018-10-24 Thread Morgan Fainberg
removed keystonemiddleware as LP will timeout when trying to update. ** No longer affects: keystonemiddleware -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to neutron. https://bugs.launchpad.net/bugs/1266962 Title: Remove

[Yahoo-eng-team] [Bug 1317302] Re: pki_setup shouldn't be required to check revocations

2018-10-24 Thread Morgan Fainberg
Revocations are no longer exposed with keystone. Marking this bug as invalid. ** Changed in: keystonemiddleware Status: Triaged => Won't Fix ** Changed in: keystonemiddleware Status: Won't Fix => Invalid -- You received this bug notification because you are a member of Yahoo!

[Yahoo-eng-team] [Bug 1440493] Re: Crash with python-memcached==1.5.4

2018-10-24 Thread Morgan Fainberg
marking as invalid for ksm. ** Changed in: keystonemiddleware Status: In Progress => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1440493 Title:

[Yahoo-eng-team] [Bug 1795800] Re: Username enumeration via response timing difference

2018-10-24 Thread Morgan Fainberg
I don't know how we'll address this. Realistically, I think this is going to have to be marked as invalid/wont fix/opinion. I'm going to mark it as wont fix, we can circle back on it if there is more discussion to be had. ** Changed in: keystone Status: New => Won't Fix -- You received

[Yahoo-eng-team] [Bug 1649616] Re: Keystone Token Flush job does not complete in HA deployed environment

2018-10-24 Thread Morgan Fainberg
newton is EOL ** Changed in: keystone/newton Status: In Progress => Won't Fix ** Changed in: keystone/ocata Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity

[Yahoo-eng-team] [Bug 1793347] Re: keystone upgrade fails q->r oslo.log requirement to low

2018-10-24 Thread Morgan Fainberg
This isn't something Keystone directly has control over, what is in our requirements/g-r is what we ship with. Marking as invalid for keystone server. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1541656] Re: OAuth Identity token gives Forbidden

2018-10-24 Thread Morgan Fainberg
Marking as incomplete for OSC, please re-visit if it is still an issue (many things have changed across the board) and invalid for keystone. ** Changed in: keystone Status: Incomplete => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1235340] Re: Links always use public endpoint

2018-10-24 Thread Morgan Fainberg
Marking as wont fix. The solution has been discussed and is recommended that the public_endpoint be unset. ** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack

[Yahoo-eng-team] [Bug 1645263] Re: Unable to run stack.sh on fresh new Ubuntu Xenial 16.04 LTS, script fails with "No module named 'memcache' "

2018-10-24 Thread Morgan Fainberg
Marked as invalid. Not a lot we can do about python-memcached, but with the py3-first testing i think we are beyond this as a bug. ** Changed in: keystone Status: Incomplete => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1630092] Re: Admin password reset should be exempt from password history validation

2018-10-24 Thread Morgan Fainberg
** Changed in: keystone/newton Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1630092 Title: Admin password reset

[Yahoo-eng-team] [Bug 1635306] Re: After newton deployment _member_ role is missing in keystone

2018-10-24 Thread Morgan Fainberg
** Changed in: keystone/newton Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1635306 Title: After newton deployment

[Yahoo-eng-team] [Bug 1696111] Re: Keystone confuses users when creating a trust when there's a roles name conflict

2018-10-24 Thread Morgan Fainberg
** Changed in: keystone Status: Fix Committed => Fix Released ** Changed in: python-keystoneclient Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1717847] Re: Policy does not work for trusts

2018-10-24 Thread Morgan Fainberg
I'm going to mark this as opinion. It likely will get better with scope- types and policy-in-code, but this bug in itself isn't relevant due to how trusts were architected. ** Changed in: keystone Status: Confirmed => Opinion -- You received this bug notification because you are a member

[Yahoo-eng-team] [Bug 1704148] Re: OAUTH functional tests are broken on stable/ocata and stable/newton

2018-10-24 Thread Morgan Fainberg
** Changed in: keystone/newton Status: Fix Committed => Fix Released ** Changed in: keystone/ocata Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1703369] Re: get_identity_providers policy should be singular

2018-10-24 Thread Morgan Fainberg
** Changed in: keystone/ocata Status: Fix Committed => Fix Released ** Changed in: keystone/newton Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1767024] Re: pycadf fails on FIPS compliant system due to using md5

2018-10-24 Thread Morgan Fainberg
Not a bug in keystone. Something must be fixed in pycadf. ** Changed in: keystone Status: Incomplete => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1599546] Re: Make validation patterns configurable

2018-10-24 Thread Morgan Fainberg
Marking as invalid. Validation should not vary based upon options set in configuration keystone-to-keystone. It makes it hard to know what to expect when interacting with keystone. ** Changed in: keystone Status: In Progress => Opinion -- You received this bug notification because you

[Yahoo-eng-team] [Bug 1548580] Re: [FG-VD-16-010] Openstack Dashboard Brute Force Vulnerability Notification

2018-10-24 Thread Morgan Fainberg
I'm going to mark this as invalid. It is recommended to add a rate- limiter in-front of the openstack services if needed. Ideally Keystone could support such a bit of software, but it is largely out-of-scope (can be supplied by the fronting webservers e.g. apache and mod_ratelimit) ** Changed in:

[Yahoo-eng-team] [Bug 1715080] Re: Update global requirements to handle encoding issues with python2-pyldap-2.4.35

2018-10-24 Thread Morgan Fainberg
This is just something to do, update global-requirments and it is populated down. Updating global-requirements for a past release is hard to do, it is suggested that you simply propose the changes and it will be synchronized to keystone once it is approved. ** Changed in: keystone/pike

[Yahoo-eng-team] [Bug 1680911] Re: Revoking an unscoped token does not revoke all tokens scoped from the unscoped token

2018-10-24 Thread Morgan Fainberg
Marking this as wont fix. This really is not something we can address in a meaningful way at this time. It expands through a huge set of issues across all of openstack and is not in line with the direction of the project now. ** Changed in: keystone Status: Triaged => Won't Fix -- You

[Yahoo-eng-team] [Bug 1687593] Re: Create OAUTH request token gives 401 error when request url is admin endpoint

2018-10-19 Thread Morgan Fainberg
Newton is not maintained. Marked as wont fix. ** Changed in: keystone/newton Status: In Progress => Won't Fix ** Changed in: keystone/ocata Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1797446] [NEW] Make AuthContextMiddleware more flask friendly

2018-10-11 Thread Morgan Fainberg
Public bug reported: AuthContextMiddleware requires a lot of modification of the code for auth_token middleware. The code should be updated to ensure that there are no-web-ob specific bits that need to be carried in keystone's tree. This likely requires splitting the "tokenless auth" (x509) into

[Yahoo-eng-team] [Bug 1791111] Re: allow change password upon first use as user

2018-10-10 Thread Morgan Fainberg
Keystone does not allow "login" for locked passwords, which includes ones marked for "change before first use". Horizon needs to implement a "change password form" (or a user must use the /v3/users/password API directly). This is not something that can/will be fixed in keystone. ** Changed in:

[Yahoo-eng-team] [Bug 1792868] Re: Use uuidutils instead of uuid.uuid4()

2018-10-07 Thread Morgan Fainberg
In line with my comment on the proposed change: I am not a fan of wrapping basic functions in python with extra layers for the sake of extra layers. I also do not think the is_uuid_like is strict enough for what we do in keystone. is_uuid_like would need to have a strict enforcement that no

[Yahoo-eng-team] [Bug 1792913] Re: Keystone HTTP 500: AttributeError: type object 'GroupsResource' has no attribute '_get_domain_id_from_token'

2018-09-18 Thread Morgan Fainberg
*** This bug is a duplicate of bug 1793027 *** https://bugs.launchpad.net/bugs/1793027 ** This bug has been marked a duplicate of bug 1793027 Flask doesn't normalize domains sanely in some cases -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1793027] [NEW] Flask doesn't normalize domains sanely in some cases

2018-09-17 Thread Morgan Fainberg
controller/logs/screen-keystone.txt.gz?level=ERROR ** Affects: keystone Importance: Critical Assignee: Morgan Fainberg (mdrnstm) Status: In Progress ** Changed in: keystone Status: New => Triaged ** Changed in: keystone Importance: Undecided => Critical ** Change

[Yahoo-eng-team] [Bug 1792047] [NEW] keystone rbacenforcer not populating policy dict with view args

2018-09-11 Thread Morgan Fainberg
/294ca38554bb229f66a772e7dba35a5b08a36b20/keystone/common/authorization.py#L152 ** Affects: keystone Importance: High Assignee: Morgan Fainberg (mdrnstm) Status: In Progress ** Affects: keystone/rocky Importance: High Assignee: Morgan Fainberg (mdrnstm) Status: In Progress ** Affects

[Yahoo-eng-team] [Bug 1777671] [NEW] Incorrect use of translation _()

2018-06-19 Thread Morgan Fainberg
Public bug reported: Keystone uses translated strings both in logging an exceptions. This is incorrect. All strings that are passed to logging should remain un-translated. The solution is to duplicate the string and pass the untranslated (not wrapped with `_()`) to the logger while passing the

[Yahoo-eng-team] [Bug 1776506] [NEW] Keystone JSON HOME on / fails

2018-06-12 Thread Morgan Fainberg
18-06-11 20:16:29.824 216 ERROR keystone.common.wsgi ValueError: Extra data: line 1 column 5 - line 5 column 22 (char 4 - 52) 2018-06-11 20:16:29.824 216 ERROR keystone.common.wsgi ** Affects: keystone Importance: High Assignee: Morgan Fainberg (mdrnstm) Status: In Progress

[Yahoo-eng-team] [Bug 1776504] [NEW] flaskification

2018-06-12 Thread Morgan Fainberg
definitions * all routable paths will be owned by the base prefix (e.g. keystone.api.user will own everything under /user/) * Paste Deploy removed ** Affects: keystone Importance: Medium Assignee: Morgan Fainberg (mdrnstm) Status: In Progress ** Changed in: keystone Status: New

[Yahoo-eng-team] [Bug 1578466] Re: keystone token cache should offer encryption like the middleware cache does

2018-06-03 Thread Morgan Fainberg
This is something we should build into oslo.cache. I have moved the bug to wont fix in keystone and added oslo.cache. ** Also affects: oslo.cache Importance: Undecided Status: New ** Changed in: keystone Status: Triaged => Won't Fix ** Summary changed: - keystone token cache

[Yahoo-eng-team] [Bug 1578401] Re: tokens in memcache have no/improper expiration

2018-06-03 Thread Morgan Fainberg
This is not a bug. Dogpile.cache can set an actual memcache expiration, however, we have simply been leaning on the LRU capabilities on memcache. For keystone this would need to be changed in oslo.cache not in Keystone. I am marking this as opinion, it's not really a bug, it is how we have

[Yahoo-eng-team] [Bug 1763824] Re: JSON schema validator.nullable doesn't work with ENUMs

2018-04-18 Thread Morgan Fainberg
This also impacts ocata. ** Also affects: keystone/ocata Importance: Undecided Status: New ** Changed in: keystone/ocata Status: New => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack

[Yahoo-eng-team] [Bug 1763824] [NEW] JSON schema validator.nullable doesn't work with ENUMs

2018-04-13 Thread Morgan Fainberg
/openstack/keystone/blob/56237b709ef901fabfd9e8ba744bbcc4cebf8b9b/keystone/common/validation/__init__.py#L33-L43 ** Affects: keystone Importance: Medium Assignee: Morgan Fainberg (mdrnstm) Status: In Progress ** Affects: keystone/pike Importance: Medium Assignee: Morgan

[Yahoo-eng-team] [Bug 1750415] Re: validation of app cred tokens is dependent on CONF.token.cache_on_issue

2018-02-19 Thread Morgan Fainberg
Based upon research and discussions in IRC, turns out we do not store the application_credential_id in the token payload. This means that if the token is not pre-populated in the cache, the test will fail. This also means that if the token cache expires, subsequent uses of the token with the

[Yahoo-eng-team] [Bug 1735250] Re: Password column limit (128 char) in the Password table exceeded when using passwords exceeding 2000 characters

2017-11-29 Thread Morgan Fainberg
This is an issue with the SQLAlchemy hybrid_property.expression use in the user ref, where .expression is returning Password.password. This appears to be an incorrect use of hybrid_property.expression. The net result is that in some cases we store the un-hashed password (in memory only) on the

[Yahoo-eng-team] [Bug 1708005] Re: 6 out 10 keystone.tests.unit.test_cert_setup.* unit test cases failed in stable/newton branch

2017-08-10 Thread Morgan Fainberg
** Project changed: keystoneauth => keystone -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1708005 Title: 6 out 10 keystone.tests.unit.test_cert_setup.* unit test

[Yahoo-eng-team] [Bug 1615084] Re: Keystone server should define "type" attribute as a MIME Media Type but accepts everything

2017-08-10 Thread Morgan Fainberg
Keystoneclient has nothing to say about what the server accepts. If anything this is a keystone issue. ** Project changed: python-keystoneclient => keystone -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity

[Yahoo-eng-team] [Bug 1615076] Re: Keystone server does not define "enabled" attribute for Region but mentions in v3 regions.py

2017-08-10 Thread Morgan Fainberg
** Project changed: python-keystoneclient => keystone -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1615076 Title: Keystone server does not define "enabled"

[Yahoo-eng-team] [Bug 1588860] Re: keystone-manage bootstrap cannot recover admin account

2017-08-09 Thread Morgan Fainberg
Mitaka is EOL ** Changed in: keystone/mitaka Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1588860 Title:

[Yahoo-eng-team] [Bug 1579604] Re: project delete returns 501 NotImplemented with templated catalog

2017-08-09 Thread Morgan Fainberg
Mitaka is EOL ** Changed in: keystone/mitaka Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1579604 Title: project

[Yahoo-eng-team] [Bug 1621626] Re: Unauthenticated requests return information

2017-08-09 Thread Morgan Fainberg
Mitaka is EOL ** Changed in: keystone/mitaka Status: New => Won't Fix ** Changed in: keystone/mitaka Status: Won't Fix => Fix Released ** Changed in: keystone/mitaka Status: Fix Released => Won't Fix -- You received this bug notification because you are a member of Yahoo!

[Yahoo-eng-team] [Bug 1629446] Re: federated login fails after user is removed from group

2017-08-09 Thread Morgan Fainberg
Mitaka is EOL ** Changed in: keystone/mitaka Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1629446 Title: federated

[Yahoo-eng-team] [Bug 1701541] Re: Keystone v3/roles has differnt response for HEAD and GET (again)

2017-08-09 Thread Morgan Fainberg
As per lance, this is being marked as wont fix. we can re-visit when/if microversions or v4 is implemented. ** Changed in: keystone Status: New => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack

[Yahoo-eng-team] [Bug 1644862] Re: domain ldap tls_cacertfile "forgotten" in multidomain configuration

2017-08-09 Thread Morgan Fainberg
Mitaka is EOL ** Changed in: keystone/mitaka Status: New => Won't Fix ** Changed in: keystone/mitaka Status: Won't Fix => Fix Released ** Changed in: keystone/mitaka Status: Fix Released => Won't Fix -- You received this bug notification because you are a member of Yahoo!

[Yahoo-eng-team] [Bug 1587777] Re: Mitaka: dashboard performance

2017-08-09 Thread Morgan Fainberg
I am marking this bug closed as the two patches in #17 have merged (inc. the backport). ** Changed in: keystone Status: New => Fix Released ** Changed in: keystone Importance: Undecided => Medium -- You received this bug notification because you are a member of Yahoo! Engineering

[Yahoo-eng-team] [Bug 1681348] Re: keystone list project api returns empty if "?name=" is added as url parameter

2017-08-09 Thread Morgan Fainberg
Unfortunately, we cannot change the behavior without a microversion uspport or something similar. ?name= will need to maintain returning an empty list, as that is the contract. I am closing this as wont fix. ** Changed in: keystone Status: New => Won't Fix -- You received this bug

[Yahoo-eng-team] [Bug 1669070] Re: Checking whether group has role assignment on domain without specifying a role ID result in HTTP 200

2017-07-28 Thread Morgan Fainberg
This isn't a bug. IF the {role_id} at the end of the call is not passed, we use the list action of: /v3/domains/{domain_id}/groups/{group_id}/roles/ (regardless of head or get action) If a role_id is passed, you're calling a different API. This is not a great design, but this is working as

[Yahoo-eng-team] [Bug 1576765] Re: Potential DOS: Keystone Extra Fields

2017-07-17 Thread Morgan Fainberg
** Changed in: keystone Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1576765 Title: Potential DOS: Keystone Extra Fields

[Yahoo-eng-team] [Bug 1680040] Re: Not all GET should have a correspondent HEAD, and vice-versa

2017-04-05 Thread Morgan Fainberg
HEAD calls should still be supported. It may not make sense for some things, but it can be useful (someone can check content length, which should be identical, or headers, or any number of things that aren't what you'd expect). Simply put, it costs us *nothing* to support it. ** Changed in:

[Yahoo-eng-team] [Bug 1668503] Re: sha512_crypt is insufficient, use pbkdf2_sha512 for password hashing

2017-02-28 Thread Morgan Fainberg
** Changed in: keystone/ocata Status: New => Won't Fix ** Changed in: keystone/mitaka Status: New => Won't Fix ** Changed in: keystone/newton Status: New => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1668503] Re: sha512_crypt is insufficient, use pdkfd_sha512 for password hashing

2017-02-27 Thread Morgan Fainberg
** Changed in: keystone Importance: Critical => High ** Also affects: keystone/mitaka Importance: Undecided Status: New ** Also affects: keystone/pike Importance: High Assignee: Morgan Fainberg (mdrnstm) Status: In Progress ** Also affects: keystone/new

[Yahoo-eng-team] [Bug 1668503] [NEW] sha512_crypt is insufficient, use pdkfd_sha512 for password hashing

2017-02-27 Thread Morgan Fainberg
processing). The correct mechanism is to use bcrypt, scrypt, or pdkfd_sha512 instead of sha512_crypt. This bug is marked as public security as bug #1543048 has already highlighted this issue. ** Affects: keystone Importance: Critical Assignee: Morgan Fainberg (mdrnstm) Status

[Yahoo-eng-team] [Bug 1659051] Re: Use CORS set_defaults

2017-01-24 Thread Morgan Fainberg
Keystone does not call .set_latent anywhere. This is an issue with oslo.middleware possibly. ** Changed in: keystone Status: New => Invalid -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone).

[Yahoo-eng-team] [Bug 1659053] [NEW] use uuids with pycadf

2017-01-24 Thread Morgan Fainberg
Public bug reported: pycadf warnings are plentiful in keystone tests: UserWarning: Invalid uuid. To ensure interoperability, identifiersshould be a valid uuid. warnings.warn('Invalid uuid. To ensure interoperability, identifiers' Be sure keystone is providing uuids appropriately. **

[Yahoo-eng-team] [Bug 1659051] [NEW] Use CORS set_defaults

2017-01-24 Thread Morgan Fainberg
Public bug reported: During test runs there are a lot of warnings for DeprecationWarning: Method 'CORS.set_latent()' has moved to 'method.set_defaults() We should ensure keystone is using set_defaults instead of latent. ** Affects: keystone Importance: Undecided Status: New --

[Yahoo-eng-team] [Bug 1491926] Re: Remove padding from Fernet tokens

2017-01-17 Thread Morgan Fainberg
Kilo is EOL ** Changed in: keystone/kilo Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1491926 Title: Remove padding from

[Yahoo-eng-team] [Bug 1488208] Re: Revoking a role assignment revokes unscoped tokens too

2017-01-17 Thread Morgan Fainberg
Kilo is EOL ** Changed in: keystone/kilo Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1488208 Title: Revoking a role

[Yahoo-eng-team] [Bug 1490804] Re: [OSSA 2016-005] PKI Token Revocation Bypass (CVE-2015-7546)

2017-01-17 Thread Morgan Fainberg
** Changed in: keystone/kilo Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1490804 Title: [OSSA 2016-005] PKI Token

[Yahoo-eng-team] [Bug 1484237] Re: token revocations not always respected when using fernet tokens

2017-01-17 Thread Morgan Fainberg
Kilo is EOL ** Changed in: keystone/kilo Status: In Progress => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1484237 Title: token revocations

[Yahoo-eng-team] [Bug 1541621] Re: Invalid fernet X-Subject-Token token should result in 404 instead of 401

2017-01-17 Thread Morgan Fainberg
** Changed in: keystone/liberty Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1541621 Title: Invalid fernet

[Yahoo-eng-team] [Bug 1527759] Re: Default domain no longer lets keystone tenant-list work

2017-01-17 Thread Morgan Fainberg
** Changed in: keystone/liberty Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1527759 Title: Default domain no longer

[Yahoo-eng-team] [Bug 1526976] Re: Any operation without token fails with internal server error for fernet token

2017-01-17 Thread Morgan Fainberg
** Changed in: keystone/liberty Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1526976 Title: Any operation without

[Yahoo-eng-team] [Bug 1497461] Re: Fernet tokens fail for some users with LDAP identity backend

2017-01-17 Thread Morgan Fainberg
** Changed in: keystone/liberty Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1497461 Title: Fernet tokens fail for

[Yahoo-eng-team] [Bug 1555187] Re: keystone fails to start in kilo due to pysaml2 4.0.4 release

2017-01-17 Thread Morgan Fainberg
** Changed in: keystone/kilo Status: In Progress => Fix Released -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is subscribed to OpenStack Identity (keystone). https://bugs.launchpad.net/bugs/1555187 Title: keystone fails to start in

[Yahoo-eng-team] [Bug 1645908] Re: Domain id reference for federated users fails in keystone middleware

2017-01-17 Thread Morgan Fainberg
Moved to keystonemiddleware project. ** Also affects: keystonemiddleware Importance: Undecided Status: New ** Changed in: keystone Status: New => Invalid ** No longer affects: keystone -- You received this bug notification because you are a member of Yahoo! Engineering Team,

[Yahoo-eng-team] [Bug 1656076] Re: The keystone server auth pluigin methods could mismatch user_id in auth_context

2017-01-12 Thread Morgan Fainberg
Turns out the issue comes from the test suite not using the AuthContext object. A new patch to ensure we are using AuthContext not a dict will be proposed in lieu of the current fix. ** Changed in: keystone/mitaka Status: In Progress => Invalid ** Changed in: keystone/newton

[Yahoo-eng-team] [Bug 1656076] Re: The keystone server auth pluigin methods could mismatch user_id in auth_context

2017-01-12 Thread Morgan Fainberg
** Changed in: keystone Status: New => Triaged ** Changed in: keystone Importance: Undecided => Medium ** Changed in: keystone Assignee: (unassigned) => Morgan Fainberg (mdrnstm) ** Also affects: keystone/newton Importance: Undecided Status: New ** Als

[Yahoo-eng-team] [Bug 1656076] [NEW] The keystone server auth pluigin methods could mismatch user_id in auth_context

2017-01-12 Thread Morgan Fainberg
*** This bug is a security vulnerability *** Public security bug reported: The keystone server blindly overwrites the auth_context.user_id in each auth method that is run. This means that the last auth_method that is run for a given authentication request dictates the user_id. While this is not

[Yahoo-eng-team] [Bug 1646273] Re: is_admin_project missing when it's not true (missing rather than false)

2016-11-30 Thread Morgan Fainberg
The other bug was/is public (as referenced in #4 by matt) and this was specifically for newton. Marking this as invalid as this is a Class E / "not a bug") ** Changed in: ossa Status: Incomplete => Invalid -- You received this bug notification because you are a member of Yahoo!

[Yahoo-eng-team] [Bug 1259011] Re: Certificates cannot be retrieved from the V3 API

2016-04-18 Thread Morgan Fainberg
With PKI tokens being deprecated, I am going to mark this as "wont fix", prefering Fernet and/or UUID tokens to PKI ** Changed in: keystonemiddleware Status: Triaged => Won't Fix -- You received this bug notification because you are a member of Yahoo! Engineering Team, which is

[Yahoo-eng-team] [Bug 1571150] Re: login as admin to projects fails

2016-04-18 Thread Morgan Fainberg
As an additional note this would not affect keystoneauth but affect keystone from what I can tell. Your logs will help us significantly. I've retargeted the bug to keystone instead of keystoneauth, pending your log files. ** Project changed: keystoneauth => keystone -- You received this bug

[Yahoo-eng-team] [Bug 1570463] Re: RFE: keystone-manage CLI to allow using syslog & specific log files

2016-04-14 Thread Morgan Fainberg
The fernet keys should not be writable by the keystone user, typically by root (same as a certificate), therefore the log should likewise be separate to avoid breaking normal logging. The use of syslog would easily solve this issue. ** Tags added: fernet logging low-hanging-fruit ** Changed in:

  1   2   3   4   >